1. Launch ZAP2. Go through the web site I plan on doing penetration testing for3. Click on all the links in the website4. Run the spider to see if any hidden links were missed5 Create a custom context for my web applications I need to test:The Context fields that I configured are:
a. Include in Context – This will hold the URL of the web application that the security scanner will focus on.
b. Exclude from Context – This will have any URLs that the security scanner will ignore while scanning the web application.In my case I believe I put the url for the logout to exclude
c. Authentication –A Form-based Authentication (since the web site requires a username and password)
i. The target URL - the login page
ii. Username Parameter
iii. Password Parameter
iv. Regex pattern parameter of either the logged in or logged out response messages. I like to use the logged in html tag since it has Welcome<myUsername> in the tag
v. Users – enable my user name
vi. Force User – will select the user I created to log in as while scanning the application
2. I also enable the "force user" icon which is the lock icon on top of the zap application
3. I then use the active scanner using the starting point URL with has an asterisk appended to it. Which from my understanding will scan any url that begins with the same string in this field
a. Within the active scanner I also select my context that I have configured from the step above
b. I select the user I created in the context section
4. The only advance option I use is the Policy tab to set the default threshold and attack strength
5. Then I scan and once the scan is completed i generate the html report
Anyone got any other suggestions?
Cheers,
Simon